RAR-files |
linkedin.learning.foundational.javascript.security-xqzt.rar |
50,000,000 |
F9586C1A |
linkedin.learning.foundational.javascript.security-xqzt.r00 |
50,000,000 |
4C24154E |
linkedin.learning.foundational.javascript.security-xqzt.r01 |
50,000,000 |
06326A9E |
linkedin.learning.foundational.javascript.security-xqzt.r02 |
15,925,700 |
2980F248 |
|
Total size: |
165,925,700 |
|
|
Archived
files |
01.01-foundational_javascript_security.mkv
[f3b6f8b7b984a313]
|
4,877,061 |
3ACEB7E0 |
01.02-what_you_should_know.mkv
[16be34a2f1b99a4e]
|
1,708,078 |
F0DDDCEA |
02.01-what_is_ethical_hacking.mkv
[fb6c91c8fc01b207]
|
3,895,185 |
48E9146E |
02.02-overview_of_cyber_kill_chain.mkv
[427d49da7dbdf19]
|
5,555,835 |
CF003DBA |
02.03-plan_an_attack_strategy.mkv
[8ec60ea6191b3a9b]
|
3,778,582 |
FB2FFDE3 |
02.04-base_project_setup.mkv
[b305c3b678fd075b]
|
7,272,214 |
C3D5FC5F |
02.05-challenge_what_is_ethical_hacking.mkv
[52c201081de4e78a]
|
1,309,178 |
8EABFD0C |
02.06-solution_what_is_ethical_hacking.mkv
[e5221940c721d1ba]
|
1,236,830 |
7E562039 |
03.01-reconnaissance_introduction.mkv
[6b46cc7c7d095c4a]
|
15,125,541 |
DA54E024 |
03.02-introduction_and_setup_for_snyk.mkv
[aad3a7dae495ced8]
|
18,906,645 |
F94FFCD5 |
03.03-introduction_to_github_dependabot.mkv
[24548eff2098fe04]
|
9,405,402 |
A55B874F |
03.04-introduction_to_appsensor.mkv
[85248ca7ffb6e49c]
|
3,330,805 |
FBA07804 |
03.05-reconnaissance_applied_to_project.mkv
[ddc3d1bab4c692d1]
|
1,447,980 |
86D4C2F6 |
03.06-challenge_what_is_the_purpose_of_reconnaissance.mkv
[f22ee10618970fc]
|
1,256,277 |
602A5D54 |
03.07-solution_what_is_the_purpose_of_reconnaissance.mkv
[d3f45a6643a09883]
|
1,770,245 |
0FDDB43D |
04.01-injection_threat.mkv
[4962507543056ee7]
|
5,493,138 |
6C79919D |
04.02-broken_authentication.mkv
[3cd4516b3459926c]
|
3,599,391 |
485CA52B |
04.03-sensitive_data.mkv
[3f6e0f33c978c35]
|
1,989,101 |
AD5C97A9 |
04.04-xml_external_entities.mkv
[dc3dbbe0e378ab6d]
|
2,574,009 |
920929EE |
04.05-security_misconfiguration.mkv
[c20dfef0b1f1e08c]
|
3,561,527 |
0A681CC6 |
04.06-insecure_deserialization.mkv
[eef4b9293f1f2a5b]
|
2,213,168 |
9F80CB66 |
04.07-components_with_known_vulnerabilities.mkv
[eb8e1c787757dedd]
|
2,350,030 |
1C6D04EE |
04.08-insufficient_logging_and_monitoring.mkv
[4fe02f65cd56300]
|
4,620,696 |
0923EB91 |
04.09-challenge_what_is_the_best_resource_for_top_threats.mkv
[ec293a153ee725f7]
|
1,416,277 |
D60F45AB |
04.10-solution_what_is_the_best_resource_for_top_threats.mkv
[cb1fcc14fe352c37]
|
1,839,278 |
01A2BB93 |
05.01-injection_threat_resources.mkv
[300e7b310156302e]
|
12,981,995 |
713F79DA |
05.02-broken_authentication_resources.mkv
[1cb3b062784aab7d]
|
8,303,206 |
8BC3638F |
05.03-sensitive_data_exposure_resources.mkv
[a7a197394a9e9420]
|
6,323,320 |
F9556AC4 |
05.04-xml_external_entities_resources.mkv
[82653d72cddeab8a]
|
7,748,455 |
737F8B2E |
05.05-security_misconfiguration_resources.mkv
[77563b2d7aec475e]
|
7,069,421 |
9DC89E21 |
05.06-secure_deserialization_resources.mkv
[4395fbba73799425]
|
4,433,370 |
F497D51E |
05.07-challenge_what_is_secured_deserialization.mkv
[b856d1b45975af9e]
|
1,756,918 |
FA58EB4E |
05.08-solution_what_is_secured_deserialization.mkv
[ccb3a2b6d7334b8b]
|
2,511,418 |
2BA4170C |
06.01-next_steps.mkv
[7dceeb75b556c622]
|
4,029,197 |
2D7439E1 |
Ex_Files_Foundational_JavaScript_Security.zip |
232,832 |
50646B9D |
|
Total size: |
165,922,605 |
|
|